Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @0xw2w
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0xw2w
-
Prikvačeni tweet
Wrote a new article https://medium.com/p/9bc532ffa564/ «Сookie-based XSS exploitation | $2300 Bug Bounty story». The article contains exploitation methods that I have ever used, which will help you to understand how to use this XSS to prove and increase vulnerability impact. Happy reading:)
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
In December, I submitted 21 vulnerabilities to 12 programs on
@Hacker0x01.#TogetherWeHitHarder https://hackerone.com/last-monthHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Yay, I was awarded a $1500 bounty for Information Disclosure and $850 bounty for Race Condition on two accounts using https://github.com/w9w/turbo-intruder/blob/master/race%20condition_for_two_different_requests … on
@Hacker0x01! https://hackerone.com/w2w#TogetherWeHitHarderHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Yay, I was awarded a $600 bounty for Improper Access Control that led to free use of monetary subscription on
@Hacker0x01! https://hackerone.com/w2w#TogetherWeHitHarderHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Yay, I was awarded a $1,250 bounty for Cookie-based XSS, the impact of which was proofed via another DOM-based XSS on
@Hacker0x01! https://hackerone.com/w2w#TogetherWeHitHarderHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
I've just published my research on the Two Factor Authentication security subject https://bit.ly/2T95RWU . I had fun and enjoyed writing this one, hope you'll enjoy reading! Have a good read!
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Check out my 2019 Year In Review on
@Hacker0x01: https://hackerone.com/w2w/year-in-review …!#TogetherWeHitHarderHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I don't care this is New Year, Christmas or Halloween If a sweet, fresh invite comes from
@Hacker0x01, — I'm in!
#BugBountyHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Happy New Year everyone!
Have a great 2020!
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Sometimes I can write with some grammatical errors only in order to fit 280 symbols
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
To be more clear,- http://my.domain.com \
@my.textdomain.com - 500 error http://my.domain.com ^@my.textdomain.com - 500 error In my case, only http://my.anytextdomain.com worked, but all others weren't accepted. I've added it to my O R fuzzing list and recommend you to do so, too!Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
my.anotherdomain\@anotherdomain.com - 500 error my.anotherdomain^@anotherdomain.com - 302, accepted If you see that there are errors & your redirect not occurs but there are hints that this could work in particular cases, don't give up and continues fuzz!
#bugbountytip#bugbountyPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Yay, I was awarded a $750 bounty for Open Redirect that leads to ATO via SAML SSO data capture through POST request on a third-party domain on
@Hacker0x01! https://hackerone.com/w2w#TogetherWeHitHarderPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
List all IPs in a subnet in a pure view: nmap -sL -n 192.168.0.1/32, 192.168.1.0/30 | grep 'Nmap scan report for' | cut -f 5 -d ' '
#bugbountyHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
@Burp_Suite a bug on the macOS app, - there is no possibility to exit from Grep - Extract window by clicking on the red button(no reaction on the click), a user needs to click Cancel every time.pic.twitter.com/o1q8UlvqDw
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hey
@Burp_Suite, how can I Grep - Extract from the response of another request, not current? For example, I want to update the CSRF header value on /login endpoint by parsing CSRF token value from /csrf endpoint, all in an intruder.pic.twitter.com/tktsCU69Ia
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
The toughest protection I've seen today - after 1 incorrect attempt of 2FA code entering, account blocking occurs and you need to unblock your account using an email with the support team.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
